Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT

被引:2
|
作者
Zhang, Qingyang [1 ]
Fu, Yujie [1 ]
Cui, Jie [1 ]
He, Debiao [2 ,3 ]
Zhong, Hong [1 ]
机构
[1] Anhui Univ, Inst Phys Sci & Informat Technol, Sch Comp Sci & Technol, Anhui Engn Lab IoT Secur Technol,Key Lab Intellige, Hefei 230039, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] MatrixElements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
Industrial Internet of Things; Encryption; Cryptography; Costs; Servers; Access control; Computational efficiency; data sharing; attribute-based encryption; proxy re-encryption; access control; ACCESS-CONTROL; SCHEME; SECURE; INTERNET;
D O I
10.1109/TDSC.2024.3386690
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the industrial Internet of Things (IIoT), the amount of data generated by industrial manufacturing equipment will increase. To reduce the cost of data management while achieving secure data sharing, data owners generally upload the resulting ciphertexts to a cloud server after encrypting their data. Attribute-based encryption (ABE) is a valuable technology that implements fine-grained access control over shared information; however, its computational complexity is not suitable for resource-constrained IIoT devices, making it difficult to apply directly to an IIoT environment. To address this problem, we design a fine-grained data sharing scheme based on proxy re-encryption in IIoT. In the proposed scheme, data files are encrypted through an identity-based encryption and a data owner can authorize a semi-trusted proxy server to transform the ciphertext into an ABE ciphertext. This realizes fine-grained access control and decreases a data owner's computational cost in data sharing. In addition, the computational burden is outsourced to a cloud server, and users only need to perform simple computing operations. A formal security proof indicates the proposed scheme's selective chosen-plaintext attack security. Theoretical and experimental analyses illustrate that our construction is more efficient than previous schemes.
引用
收藏
页码:5797 / 5809
页数:13
相关论文
共 50 条
  • [1] Cloud based data sharing with fine-grained proxy re-encryption
    Yang, Yanjiang
    Zhu, Haiyan
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Choo, Kim-Kwang Raymond
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 122 - 134
  • [2] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [3] Fine-Grained Conditional Proxy Re-Encryption and Application
    Yang, Yanjiang
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Sakurai, Kouichi
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 206 - 222
  • [4] BFFDT: Blockchain-Based Fair and Fine-Grained Data Trading Using Proxy Re-Encryption and Verifiable Commitment
    Long, Yangyang
    Peng, Changgen
    Chen, Yuling
    Tan, Weijie
    Sun, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38508 - 38520
  • [5] A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems
    Hong, Hanshu
    Liu, Ximeng
    Sun, Zhixin
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06) : 2509 - 2514
  • [6] A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems
    Hanshu Hong
    Ximeng Liu
    Zhixin Sun
    Mobile Networks and Applications, 2021, 26 : 2509 - 2514
  • [7] dAPRE:Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT
    Li, Xiaoxiao
    Xie, Yong
    Wang, Hui
    Su, Xing
    Li, Haifeng
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 584 - 596
  • [8] Flexible attribute-based proxy re-encryption for efficient data sharing
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Zhou, Yunya
    INFORMATION SCIENCES, 2020, 511 (511) : 94 - 113
  • [9] Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Baek, Joonsang
    Luo, Xiapu
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 949 - 960
  • [10] Blockchain aware proxy re-encryption algorithm-based data sharing scheme
    Keshta, Ismail
    Aoudni, Yassine
    Sandhu, Mukta
    Singh, Abha
    Xalikovich, Pardayev Abdunabi
    Rizwan, Ali
    Soni, Mukesh
    Lalar, Sachin
    PHYSICAL COMMUNICATION, 2023, 58